WelcomeUser Guide
ToSPrivacyCanary
DonateBugsLicense

©2025 Poal.co

(post is archived)

[–] 0 pt

FPGAs are just generic chip that can be programmed to do stuff. Nothing to do with this.

The device that's being operated on in the video is 5 years old. Whatever encryption it used is long since broken.

[–] 0 pt

can you stay on course or are you just wandering around ?

Claim: Apple can do what THY want with your machine since YO have no way to create an apple system without the spy/remote control and do it from source code

your rambling on "broken encryption" is totally irrelevant

[–] 0 pt

I literally have no idea what you're talking about, and neither do you.

The video, if you'd watched it, (and you didn't) was about someone removing the T2 ROM chip for the T2 processor, reading it, and using pretty much since day 1 known bypasses to reset the signatures so the machine looks like a new device to iCloud and can be reused. The chip needs to be physically removed and reprogrammed with another Mac in order to accomplish this, so it's not something you do trivially and not without specialized tools and knowledge. Nigger that steals your device is still going to have a device it can't use. But a repair shop is going to always need tools to make repairs, and that's probably where these leaked from. Otherwise? You'd simply throw your computer away when you lose the password.

Removing parts and reprogramming them, even if you don't know what you're reprogramming them with, is always going to override any security built in to a device, and that's what this video is about. Go back and watch it.

I have no idea what the fuck you're talking abut with spyware and controls and shit. Any computer you buy today has something built into one of the parts that talks to mommy, so I hope you're not using a computer. I literally have no desire to listen to you any more, you're just as bad as the apple sheep who bleat about how good their shiny toys are.

[–] 0 pt

Oh, the usual smart ass that does not get the point

I wrote the claim, again: Apple can do what THEY want with your machine since YOU have no way to create an apple system without the spy/remote control and do it from source code. this is the claim

it is relevant to the post since sheeple think that apple is on their side protecting their valuable information. no, it is not

I even mentioned that "backdoors" are planted on purpose for plausible deniability

you are getting closer and closer to an apple fanboy